Press "Enter" to skip to content

How to Share GCP Images with Other Users and Projects

0

We always can share Compute Engine images, snapshots, and disks with other users outside of your project or organization. Basically users with read access to those resources can use them to complete operations in other projects and organizations. For example, if you grant a user read access to an image or snapshot in your project, they can use those resources…

Symantec Diagnostic Tool – SymDiag Usage Guide

0

The Symantec Diagnostic Tool (SymDiag) is a multi-product, multi-language diagnostic, and security analysis utility. SymDiag is provides self-help support for Symantec product technical issues, zero-day threat analysis, best practice recommendations, and proactive services to customers. If you require further assistance, SymDiag lowers the level of effort and increases efficiency by automating data gathering and support case submission. SymDiag support most of…

Windows Server 2012 Tips and Tricks

0

Building a lab to test some Windows services , AD, DNS, DHCP, ADCS, etc. in my VMware ESXi 6 environment, to get it running smoothly and reduce some headache, I used following tricks to make my life easier. Most of work has to be done by Group Policy Management Editor. If you are running in a domain environment, create this…

Check Your Site Vulnerability if Listing on Bounty Site.

0

As long as your web application published on Internet, one day it will face the hackers scanning. There is no 100% security and you always want to find out the vulnerability first before it can be exploited. There are many bounty programs online to attract hackers to search those vulnerabilities and publish out, also notify web master. Open Bug Bounty…

Sumuri Paladin 7 Forensics Suite Basic Usage

0

PALADIN is a bootable forensic Linux distribution based on Ubuntu and is developed and provided as a courtesy by SUMURI. The boot process has been modified to assure that the internal or external media of computers and devices are not modified or mounted. PALADIN is available as an ISO which can be used to make a bootable DVD or USB.…

CISCO ASA VPN Tips and Tricks

0

1. Clear VPN Configuration:  clear configure crypto map VPN_AAAA 2. Debug and show commands: Enable logging: ciscoasa#terminal monitor ciscoasa(config)# logging buffer-size 1048576 ciscoasa(config)# logging buffered 7 ciscoasa(config)# logging monitor 7 ciscoasa(config)# debug crypto condition peer 10.10.10.10 ciscoasaa(config)# ciscoasa(config)# debug crypto ipsec 127

Basic Procedures to Troubleshoot an Infected Computer

0

Today received a report from user, computer is slow and seems have been infected with unknown virus or malware. No special symptoms except slow. 1. Check task manager and resource monitor There is a process smss.exe which description is “Microsoft ? Console Based Script Host ” using almost 75% CPU all the time. From task manager, I found system was…

NSS Labs NGFW Security Value Map Report (2017, 2016, 2014, 2013, 2012, 2011)

0

The NGFW is the first line of defense to protect against today’s evolving threats and is a critical component of any defense-in-depth strategy.  The NSS Labs NGFW test methodology has evolved from the previous testing to reflect the threat landscape and therefore, this latest testing includes SSL inspection.  This is an important key test factor because most vendors see huge…